Join this IBM i Security Webinar (part 1 of 2)
Wednesday Feb 26th, 2014, 11am AEDT (your time)
IBM i comes with a rich set of features such as authentication, integrity, authorisation, auditing & more, but, unless you know how best to use these features, your benefits are limited!
In this first out of two sessions, Simon will go over areas of significant importance to your IBM i security.
- Passwords Exposure: Plausible methods of attack and steps to reduce your exposure
- System Updates: If it's not broken, why fix it? For many good reasons
- Minimizing exposure: Benefits of limiting your attack surface
- Object authority pitfalls: Find out typical weakness in popular applications
Planned topics for the March session: Object Authority, User Profiles Abuse, Special Authority, IFS Securty, Network Access, Adopted Authority.
Or, tell us what security issues you wish to know more about and we will be happy to oblige.
Towards the end of the session...
Do you have the time?
Are you as proficient and efficient as you can and should be in securing your IBM i? Amir will go through a quick demonstration of the following automated processes and procedures:
- A free tool you start with to identify system wide weaknesses.
- A way to ovoid the large excel with User Profile data.
- Automate the process of running exclusion reports. See only the problem.
- Other efficient ways to better protect your system
Don't miss this opportunity to gain more knowledge about IBM i's security fundamentals and how to manage your time effectively whilst securing your platform. |
|